Skip to content

Commit

Permalink
docs: update docs for iar and openshift
Browse files Browse the repository at this point in the history
  • Loading branch information
redhatrises committed May 29, 2024
1 parent 2315a98 commit 2a4bab0
Show file tree
Hide file tree
Showing 20 changed files with 124 additions and 76 deletions.
2 changes: 1 addition & 1 deletion config/samples/falcon_v1alpha1_falconimageanalyzer.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,7 @@ metadata:
app.kubernetes.io/part-of: falcon-operator
app.kubernetes.io/managed-by: kustomize
app.kubernetes.io/created-by: falcon-operator
name: falconimageanalyzer-sample
name: falcon-iar
spec:
falcon_api:
client_id: PLEASE_FILL_IN
Expand Down
2 changes: 1 addition & 1 deletion docs/deployment/azure/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@
This document will guide you through the installation of the Falcon Operator and deployment of the following custom resources provided by the Falcon Operator:
- [FalconAdmission](../../resources/admission/README.md) with the Falcon Admission Controller image being mirrored from CrowdStrike container registry to ACR (Azure Container Registry).
- [FalconContainer](../../resources/container/README.md) with the Falcon Container image being mirrored from CrowdStrike container registry to ACR (Azure Container Registry).
- [FalconImageAnalyzer](../../resources/imageanalyzer/README.md) with the Falcon Image Analyzer image being mirrored from CrowdStrike container registry.
- [FalconImageAnalyzer](../../resources/imageanalyzer/README.md) with the Falcon Image Analyzer image being pull from the CrowdStrike container registry.
- [FalconNodeSensor](../../resources/node/README.md) custom resource to the cluster.

## Prerequisites
Expand Down
5 changes: 4 additions & 1 deletion docs/deployment/eks-fargate/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@
This document will guide you through the installation of the Falcon Operator and deployment of the following custom resources provided by the Falcon Operator:
- [FalconAdmission](../../resources/admission/README.md) with the Falcon Admission Controller image being mirrored from CrowdStrike container registry to ECR (Elastic Container Registry). A new AWS IAM Policy will be created to allow the operator to push to ECR registry.
- [FalconContainer](../../resources/container/README.md) with the Falcon Container image being mirrored from CrowdStrike container registry to ECR (Elastic Container Registry). A new AWS IAM Policy will be created to allow the operator to push to ECR registry.
- [FalconImageAnalyzer](../../resources/imageanalyzer/README.md) with the Falcon Image Analyzer image being mirrored from CrowdStrike container registry.
- [FalconImageAnalyzer](../../resources/imageanalyzer/README.md) with the Falcon Image Analyzer image being pull from the CrowdStrike container registry.

## Prerequisites

Expand Down Expand Up @@ -46,6 +46,9 @@ This document will guide you through the installation of the Falcon Operator and

#### Create the FalconContainer resource

> [!IMPORTANT]
> If running in a mixed environment with both Fargate and EKS instances, you must set the installNamespace to a different namespace in the FalconContainer Spec i.e. `spec.installNamespace: falcon-Sidecar` to avoid conflicts with FalconNodeSensor running in the `falcon-system` namespace.

- Create an EKS Fargate profile for the FalconContainer resource deployment:
```sh
eksctl create fargateprofile \
Expand Down
2 changes: 1 addition & 1 deletion docs/deployment/eks/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@
This document will guide you through the installation of the Falcon Operator and deployment of the following custom resources provided by the Falcon Operator:
- [FalconAdmission](../../resources/admission/README.md) with the Falcon Admission Controller image being mirrored from CrowdStrike container registry to ECR (Elastic Container Registry). A new AWS IAM Policy will be created to allow the operator to push to ECR registry.
- [FalconContainer](../../resources/container/README.md) with the Falcon Container image being mirrored from CrowdStrike container registry to ECR (Elastic Container Registry). A new AWS IAM Policy will be created to allow the operator to push to ECR registry.
- [FalconImageAnalyzer](../../resources/imageanalyzer/README.md) with the Falcon Image Analyzer image being mirrored from CrowdStrike container registry.
- [FalconImageAnalyzer](../../resources/imageanalyzer/README.md) with the Falcon Image Analyzer image being pull from the CrowdStrike container registry.
- [FalconNodeSensor](../../resources/node/README.md) custom resource to the cluster.

## Prerequisites
Expand Down
2 changes: 1 addition & 1 deletion docs/deployment/generic/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@
This document will guide you through the installation of the Falcon Operator and deployment of the following custom resources provided by the Falcon Operator:
- [FalconAdmission](../../resources/admission/README.md) with the Falcon Admission Controller image being mirrored from CrowdStrike container registry to .
- [FalconContainer](../../resources/container/README.md) with the Falcon Container image being mirrored from CrowdStrike container registry to .
- [FalconImageAnalyzer](../../resources/imageanalyzer/README.md) with the Falcon Image Analyzer image being mirrored from CrowdStrike container registry.
- [FalconImageAnalyzer](../../resources/imageanalyzer/README.md) with the Falcon Image Analyzer image being pull from the CrowdStrike container registry.
- [FalconNodeSensor](../../resources/node/README.md) custom resource to the cluster.

## Prerequisites
Expand Down
2 changes: 1 addition & 1 deletion docs/deployment/gke/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@
This document will guide you through the installation of the Falcon Operator and deployment of the following custom resources provided by the Falcon Operator:
- [FalconAdmission](../../resources/admission/README.md) with the Falcon Admission Controller image being mirrored from CrowdStrike container registry to GCR (Google Container Registry). A new GCP service account for pushing to GCR registry will be created.
- [FalconContainer](../../resources/container/README.md) with the Falcon Container image being mirrored from CrowdStrike container registry to GCR (Google Container Registry). A new GCP service account for pushing to GCR registry will be created.
- [FalconImageAnalyzer](../../resources/imageanalyzer/README.md) with the Falcon Image Analyzer image being mirrored from CrowdStrike container registry.
- [FalconImageAnalyzer](../../resources/imageanalyzer/README.md) with the Falcon Image Analyzer image being pull from the CrowdStrike container registry.
- [FalconNodeSensor](../../resources/node/README.md) custom resource to the cluster.

## Prerequisites
Expand Down
84 changes: 54 additions & 30 deletions docs/deployment/openshift/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -2,6 +2,7 @@

This document will guide you through the installation of the Falcon Operator and deployment of the following custom resources provided by the Falcon Operator:
- [FalconAdmission](../../resources/admission/README.md) with the Falcon Admission Controller image being mirrored from CrowdStrike container registry to OpenShift ImageStreams (on cluster registry).
- [FalconImageAnalyzer](resources/imageanalyzer/README.md) with the Falcon Image Analyzer image being pulled from CrowdStrike container registry.
- [FalconNodeSensor](resources/node/README.md) custom resource to the cluster.

You can choose to install the operator and custom resources through the [web console (GUI)](#installing-the-operator-through-the-web-console-gui) or through the [CLI](#installing-the-operator-through-the-cli).
Expand Down Expand Up @@ -96,7 +97,7 @@ If you want to automate the deployment of the operator, the CLI method is recomm
<details>
<summary>Click to expand</summary>
- To deploy the Falon Sidecar Sensor, click `Create Instance` for the `Falcon Admission` Kind under the `Provided APIs` for the Falcon Operator.
- To deploy the Falcon Sidecar Sensor, click `Create Instance` for the `Falcon Admission` Kind under the `Provided APIs` for the Falcon Operator.
![OpenShift CrowdStrike Falcon Admission Controller](images/ocp-fkac.png)
Expand All @@ -112,6 +113,27 @@ If you want to automate the deployment of the operator, the CLI method is recomm
</details>
### Deploy the Image Analyzer
<details>
<summary>Click to expand</summary>
- To deploy the Falcon Image Analyzer, click `Create Instance` for the `Falcon Image Analyzer` Kind under the `Provided APIs` for the Falcon Operator.
![OpenShift CrowdStrike Falcon Image Analyzer](images/ocp-iarinstall.png)
- If using the CrowdStrike API method which connects to the CrowdStrike cloud and will attempt to discover your Falcon Customer ID as well as download the Falcon Admission container image, make sure that you have a new [CrowdStrike API key pair](#prerequisites) before continuing.
On the `Create FalconImageAnalyzer` page, make sure to:
1. Replace the `Client ID` with your CrowdStrike API Client ID value
2. Replace the `Client Secret` with your CrowdStrike API Client Secret value
3. Replace the `CrowdStrike Falcon Cloud Region` with your Falcon cloud region e.g. `us-1`
4. Click `Create` to deploy the FalconImageAnalyzer Kind
- If more configuration is needed for your organization or deployment, `Falcon Image Analyzer Configuration` provides more ways to configure the deployment and behavior of the image assessment tool.
</details>
</details>
## Installing the operator through the CLI
Expand Down Expand Up @@ -192,12 +214,9 @@ Once the Krew plugin is installed:
metadata:
name: falcon-operator
namespace: falcon-operator
spec:
targetNamespaces:
- MYNAMESPACE
EOF
```
Replace `MYNAMESPACE` with the namespace that you will be deploying the node sensor. See [Deploying the Node Sensor to a custom Namespace](#deploying-the-node-sensor-to-a-custom-namespace). Otherwise, replace `MYNAMESPACE` with the `falcon-operator` namespace and create the OperatorGroup.
Then, deploy the newly created `OperatorGroup`:
```
oc create -f operatorgroup.yaml -n falcon-operator
```
Expand Down Expand Up @@ -244,44 +263,32 @@ Once the operator has deployed, you can now deploy the FalconNodeSensor.
oc create -n falcon-operator -f https://raw.githubusercontent.com/CrowdStrike/falcon-operator/main/config/samples/falcon_v1alpha1_falconnodesensor.yaml --edit=true
```
### Deploying the Node Sensor to a custom Namespace
If desired, the FalconNodeSensor can be deployed to a namespace of your choosing instead of deploying to the operator namespace.
To deploy to a custom namespace (replacing `falcon-system` as desired):
- Create a new project
```
oc new-project falcon-system
```
- Create the service account in the new namespace
```
oc create sa falcon-operator-node-sensor -n falcon-system
```
### Deploy the Admission Controller
- Add the service account to the privileged SCC
```
oc adm policy add-scc-to-user privileged system:serviceaccount:falcon-system:falcon-operator-node-sensor
```
<details>
<summary>Click to expand</summary>
- Deploy FalconNodeSensor to the custom namespace:
- Deploy FalconAdmission through the cli using the `oc` command:
```
oc create -n falcon-system -f https://raw.githubusercontent.com/CrowdStrike/falcon-operator/main/docs/config/samples/falcon_v1alpha1_falconnodesensor.yaml --edit=true
oc create -f https://raw.githubusercontent.com/CrowdStrike/falcon-operator/main/docs/deployment/openshift/falconadmission.yaml --edit=true
```
</details>
### Deploy the Admission Controller
### Deploy the Image Analyzer
<details>
<summary>Click to expand</summary>
- Deploy FalconAdmission through the cli using the `oc` command:
- Deploy FalconImageAnalyzer through the cli using the `oc` command:
```
oc create -f https://raw.githubusercontent.com/CrowdStrike/falcon-operator/main/docs/deployment/openshift/falconadmission.yaml --edit=true
oc create -f https://raw.githubusercontent.com/CrowdStrike/falcon-operator/main/config/samples/falcon_v1alpha1_falconimageanalyzer.yaml --edit=true
```
</details>
</details>
</details>
## Upgrading
Expand Down Expand Up @@ -341,6 +348,16 @@ The sidecar sensor is not intended for OpenShift. If you installed it by mistake
![OpenShift CrowdStrike Admission Controller Uninstall](images/ocp-fkacdel.png)
#### Uninstall the Image Analyzer
- Click on the `CrowdStrike Falcon Platform - Operator` listing, followed by clicking on the `Falcon Image Analyzer` tab.
![OpenShift CrowdStrikeImage Analyzer Uninstall](images/ocp-iaruninstall.png)
- On the deployed `FalconImageAnalyzer` Kind, click the 3 vertical dot action menu on the far right, and click `Delete FalconImageAnalyzer`.
![OpenShift CrowdStrike Image Analyzer Uninstall](images/ocp-iaruninstall2.png)
#### Uninstall the Operator
- In the list of `Installed Operators`, click the 3 vertical dot action menu on the far right of the `CrowdStrike Falcon Platform - Operator` listing, and click `Uninstall Operator`.
Expand Down Expand Up @@ -386,7 +403,7 @@ Once the Krew plugin is installed:
- To uninstall the node sensor, simply remove the FalconNodeSensor resource.
```
oc delete falconnodesensor -A --all
oc delete falconnodesensor falcon-node-sensor
```
##### Uninstall the Sidecar Sensor
Expand All @@ -395,7 +412,7 @@ The sidecar sensor is not intended for OpenShift. If you installed it by mistake
- To uninstall Falcon Container simply remove FalconContainer resource. The operator will uninstall Falcon Container product from the cluster.
```
oc delete falconadmissions falcon-sidecar-sensor
oc delete falconcontainers falcon-sidecar-sensor
```
##### Uninstall the Admission Controller
Expand All @@ -405,6 +422,13 @@ The sidecar sensor is not intended for OpenShift. If you installed it by mistake
oc delete falconadmissions falcon-admission
```
##### Uninstall the Falcon Image Analyzer
- To uninstall Falcon Container simply remove FalconImageAnalyzer resource. The operator will then uninstall the Falcon Image Analyzer from the cluster:
```
oc delete falconimageanalyzers falcon-iar
```
##### Uninstall the Operator
- To uninstall Falcon Operator, get the name of the subscription that the operator was installed with:
Expand Down
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
3 changes: 0 additions & 3 deletions docs/deployment/openshift/operatorgroup.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -3,6 +3,3 @@ kind: OperatorGroup
metadata:
name: falcon-operator
namespace: falcon-operator
spec:
targetNamespaces:
- MYNAMESPACE
2 changes: 1 addition & 1 deletion docs/deployment/openshift/resources/container/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -55,7 +55,7 @@ spec:
#### Sidecar Injection Configuration Settings
| Spec | Description |
| :---------------------------------- | :------------------------------------------------------------------------------------------------------------------------------------------------------------------ |
| installNamespace | (optional) Override the default namespace of falcon-sidecar |
| installNamespace | (optional) Override the default namespace of falcon-system |
| image | (optional) Leverage a Falcon Container Sensor image that is not managed by the operator; typically used with custom repositories; overrides all registry settings; might require injector.imagePullSecretName to be set |
| version | (optional) Enforce particular Falcon Container version to be installed (example: "6.31", "6.31.0", "6.31.0-1409") |
| registry.type | Registry to mirror Falcon Container (allowed values: acr, ecr, crowdstrike, gcr, openshift) |
Expand Down
2 changes: 1 addition & 1 deletion docs/resources/container/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -55,7 +55,7 @@ spec:
#### Sidecar Injection Configuration Settings
| Spec | Description |
| :---------------------------------- | :------------------------------------------------------------------------------------------------------------------------------------------------------------------ |
| installNamespace | (optional) Override the default namespace of falcon-sidecar |
| installNamespace | (optional) Override the default namespace of falcon-system |
| image | (optional) Leverage a Falcon Container Sensor image that is not managed by the operator; typically used with custom repositories; overrides all registry settings; might require injector.imagePullSecretName to be set |
| version | (optional) Enforce particular Falcon Container version to be installed (example: "6.31", "6.31.0", "6.31.0-1409") |
| registry.type | Registry to mirror Falcon Container (allowed values: acr, ecr, crowdstrike, gcr, openshift) |
Expand Down
5 changes: 4 additions & 1 deletion docs/src/deployment/README.md.tmpl
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,7 @@
This document will guide you through the installation of the Falcon Operator and deployment of the following custom resources provided by the Falcon Operator:
- [FalconAdmission](../../resources/admission/README.md) with the Falcon Admission Controller image being mirrored from CrowdStrike container registry to {{ get $registry .Distro }}.
- [FalconContainer](../../resources/container/README.md) with the Falcon Container image being mirrored from CrowdStrike container registry to {{ get $registry .Distro }}.
- [FalconImageAnalyzer](../../resources/imageanalyzer/README.md) with the Falcon Image Analyzer image being mirrored from CrowdStrike container registry.
- [FalconImageAnalyzer](../../resources/imageanalyzer/README.md) with the Falcon Image Analyzer image being pull from the CrowdStrike container registry.
{{- if ne .Distro "eks-fargate" }}
- [FalconNodeSensor](../../resources/node/README.md) custom resource to the cluster.
{{- end }}
Expand Down Expand Up @@ -66,6 +66,9 @@ After the Falcon Operator has deployed, you can now deploy the Falcon Node Senso

{{- if eq .Distro "eks-fargate" }}

> [!IMPORTANT]
> If running in a mixed environment with both Fargate and EKS instances, you must set the installNamespace to a different namespace in the FalconContainer Spec i.e. `spec.installNamespace: falcon-Sidecar` to avoid conflicts with FalconNodeSensor running in the `falcon-system` namespace.

- Create an EKS Fargate profile for the FalconContainer resource deployment:
```sh
eksctl create fargateprofile \
Expand Down
Loading

0 comments on commit 2a4bab0

Please sign in to comment.